Netskope Threat Protection

Decodes and inspects traffic that other security solutions cannot, such as unmanaged cloud services, sync clients, mobile apps, and TLS-encrypted cloud services and websites, to identify and address threats.

Threat protection like no other

Netskope is the only unified cloud access security broker (CASB) and next generation secure web gateway (SWG) that combines a unique cloud-native vantage point, multiple layers of threat detection, and remediation capabilities to deliver comprehensive threat protection for cloud and web services.

Netskope Security Cloud

See our platform →

Unrivaled visibility. Real-time data and threat protection.

The Netskope Security Cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. Only Netskope understands the cloud and takes a data-centric approach that empowers security teams with the right balance of protection and speed they need to secure their digital transformation journey.

Cloud-focused threat protection use cases

01

Malware prevention

Inspect your managed cloud services, such as Office 365 and Box, and inline cloud and website traffic for malware. Stop its spread by quarantining and replacing suspicious files with inert tombstone files, or blocking inline downloads.

02

Protección Avanzada contra Amenazas

Ensure defenses match your needs, with prevention, detection, and advanced AI/ML-based threat analysis options and integration with your existing security infrastructure.

03

Detect behavior anomalies

Take advantage of user behavior and entity analytics (UEBA) to baseline activities and detect anomalies, in real time. Also, detect unusual and excessive data movement, insider threats, or compromised credentials.

04

Prevent cloud phishing

Reduce the attack surface created by the managed cloud services your users trust and attackers target. Prevent cloud phishing with granular policy controls to enable company and personal instances, while blocking rogue instances.

05

 Hosting Payloads

 Legacy inline defenses often deploy ‘allow policies’ for all the services adopted by different lines of business, departments, and users. This opens the door to attack payloads being hosted in the cloud. Netskope can apply granular policies to both your managed and unmanaged clouds, to determine company approved account instances.

06

Cloud-based C2

Attackers use the cloud for command-n-control (C2) communications. Recently, an attacker used Slack for C2, knowing the company allowed it through legacy defenses. Instead of a broad ‘allow all’ for cloud services and apps, Netskope enables you to enforce granular user and account instance-aware policies to pinpoint and mitigate risks.

Attacks are evading legacy web and email defenses

Rogue accounts

Attackers use rogue account instances within trusted managed cloud services and apps to share and deliver malicious payloads. Legacy defenses typically don’t know account owners, but Netskope Cloud XDTM understands the user, app, instance, risk, data, and activity, so it can block rogue instances and prevent this attack vector.

Tailored attacks

Attackers conduct reconnaissance to identify your company’s preferred cloud services and apps and then creates fake login screens for these services to entice users to access, expose credentials, and possibly download payloads. Netskope Cloud XD analyzes cloud service hosting accounts, so it can identify and block fake login pages.

Cloud phishing

Attacker evades legacy web and email defenses by delivering phishing attack elements from trusted managed cloud services using a rogue account instance. Netskope understands the difference between company and rogue instances for your managed cloud services, such as AWS, Azure, GitHub, Box, or Drive to block cloud phishing.

Hosting payloads

Legacy inline defenses often deploy ‘allow policies’ for all the services adopted by different lines of business, departments, and users. This opens the door to attack payloads being hosted in the cloud. Netskope can apply granular policies to both your managed and unmanaged clouds, to determine company approved account instances.

Cloud-based C2

Attackers use the cloud for command-n-control (C2) communications. Recently, an attacker used Slack for C2, knowing the company allowed it through legacy defenses. Instead of a broad ‘allow all’ for cloud services and apps, Netskope enables you to enforce granular user and account instance-aware policies to pinpoint and mitigate risks.

Data exfiltration

Unprotected cloud storage that leads to data exposure is well known, however, data can also be exfiltrated through rogue accounts in managed cloud services. Netskope provides Data Loss Prevention (DLP) defenses and granular policy controls that are aware of user, app, instance, risk, data and activity to prevent data loss.

Rogue accounts

Attackers use rogue account instances within trusted managed cloud services and apps to share and deliver malicious payloads. Legacy defenses typically don’t know account owners, but Netskope Cloud XDTM understands the user, app, instance, risk, data, and activity, so it can block rogue instances and prevent this attack vector.

Tailored attacks

Attackers conduct reconnaissance to identify your company’s preferred cloud services and apps and then creates fake login screens for these services to entice users to access, expose credentials, and possibly download payloads. Netskope Cloud XD analyzes cloud service hosting accounts, so it can identify and block fake login pages.

Cloud phishing

Attacker evades legacy web and email defenses by delivering phishing attack elements from trusted managed cloud services using a rogue account instance. Netskope understands the difference between company and rogue instances for your managed cloud services, such as AWS, Azure, GitHub, Box, or Drive to block cloud phishing.

Hosting payloads

Legacy inline defenses often deploy ‘allow policies’ for all the services adopted by different lines of business, departments, and users. This opens the door to attack payloads being hosted in the cloud. Netskope can apply granular policies to both your managed and unmanaged clouds, to determine company approved account instances.

Cloud-based C2

Attackers use the cloud for command-n-control (C2) communications. Recently, an attacker used Slack for C2, knowing the company allowed it through legacy defenses. Instead of a broad ‘allow all’ for cloud services and apps, Netskope enables you to enforce granular user and account instance-aware policies to pinpoint and mitigate risks.

Data exfiltration

Unprotected cloud storage that leads to data exposure is well known, however, data can also be exfiltrated through rogue accounts in managed cloud services. Netskope provides Data Loss Prevention (DLP) defenses and granular policy controls that are aware of user, app, instance, risk, data and activity to prevent data loss.

Key features and benefits

Gain full visibility

See what’s going on with inline encrypted traffic en route to and from cloud services and websites, as well as all your files stored in managed cloud services to prevent known threats and detect the unknown.

Read more

Prevent threats and data exfiltration

Leverage multiple prevention defense layers to detect known threats, alongside shared and custom threat intelligence feeds, to automate detection of data exfiltration and account instance behavior anomalies.

Read more

Detect and hunt threats

Use multiple detection defenses, including machine learning anomaly detection and sandboxing, to uncover unknown threats, plus leverage 90 days of rich metadata for investigations and threat hunting.

Read more

Leverage cloud threat intelligence

Benefit from the insights of Netskope Threat Research Labs, which is dedicated to the discovery and analysis of new cloud threats, alongside 40+ shared threat intelligence sources, for up-to-the-minute protection against the threats you are facing.

Read more

Quickly respond to threats

Block or quarantine attacks before they can do any damage and take advantage of automated workflows to further analyze and reverse the effects of known threats. Plus, integrate and share threat intelligence and incident details with other security solutions in your infrastructure to coordinate responses.

Read more

It’s a cloud and mobile usage world today and if you’re not thinking about that from a threat propagation point of view, you’re flying blind. At the core of our CASB project was solving this side of the cloud enablement equation and Netskope gives us that power.

—CISO, Leading High Tech Company

Las empresas líderes confian en nosotros

Recursos

Shift your threat prevention to the cloud, for the cloud

85%

of web traffic is cloud services

Source: Netskope August 2019 Cloud Report

83%

Data loss / leakage

Source: Google HTTPS Encryption Transparency Report, September 2019

Solicitar una demostración

Póngase en contacto con un representante de Netskope para ver una demostración en vivo.